Challenge Description
One of the clients of our company, lost the access to his system due to an unknown error. He is supposedly a very popular “environmental” activist. As a part of the investigation, he told us that his go to applications are browsers, his password managers etc. We hope that you can dig into this memory dump and find his important stuff and give it back to us.
First get the image info
In the description “environmental” keyword gives us a hint so lets scan environment variables
When we scan environment variables we can see there is a encoded string “ZmxhZ3t3M2xjMG0zX1QwXyRUNGczXyFfT2ZfTDRCXzJ9”
When we decode the string it gives us the first flag
,
User uses Keepass as password manager so we have to look file extension for keepass
Then we should search and dump the .kdbx file
Alright we dumped the file but we don’t know the password yet. Let’s go on investigating
I tried to search files have .txt extension or files named password but I can’t find anything about password
Then I tried to search password keyword with grep -i to ignore case and here, there is a file named Password.png
So let’s dump the fie
Good then I installed Keepass on my Windows 10 VM and I opened the password database in Keepass. And there is the second flag
In the description also browser is quoted so let’s look at the browser history
Dump the file
And open it in SQLite
When you browse history there is a link ”https://mega.nz/#F!TrgSQQTS!H0ZrUzF0B-ZKNM3y9E76lg”
Let’s check the link, there is a file named Important.zip. Try to unzip it
This zip archive is password protected. But there is a hint
Encode stage 3 flag from lab1 with sha and here is the password for zip archive
And there is the last flag in Lab 2